Package: fail2ban Version: 0.8.1-3 Severity: wishlist Tags: patch The iptables actions don't log the dropped packets. It is important to know the dropped packets. To log packets without adding to iptables new matches I added a new chain that log the packets before discarding them.
-- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (560, 'testing'), (550, 'testing'), (540, 'testing-proposed-updates'), (260, 'stable'), (250, 'stable'), (240, 'proposed-updates'), (50, 'unstable') Architecture: i386 (x86_64) Kernel: Linux 2.6.22-3-amd64 (SMP w/2 CPU cores) Locale: LANG=it_IT.ISO-8859-15, LC_CTYPE=ISO_8859_15 (charmap=ISO-8859-1) (ignored: LC_ALL set to it_IT) Shell: /bin/sh linked to /bin/bash Versions of packages fail2ban depends on: ii lsb-base 3.1-24 Linux Standard Base 3.1 init scrip ii python 2.4.4-6 An interactive high-level object-o ii python-central 0.5.15-0.1 register and build utility for Pyt Versions of packages fail2ban recommends: ii iptables 1.3.8.0debian1-1 administration tools for packet fi -- no debconf information
iptables-logmultiport.local
Description: application/not-regular-file